Virtual source based multicast routing in WDM optical networks N Sreenath, C Siva Ram Murthy, G Mohan Photonic Network Communications 3 (3), 213-226, 2001 | 95 | 2001 |
A two-stage approach for virtual topology reconfiguration of WDM optical networks N Sreenath, CSR Murthy, BH Gurucharan, G Mohan Optical networks magazine 2 (3), 58-71, 2001 | 80 | 2001 |
Beyond the Hype: Internet of Things Concepts, Security and Privacy Concerns AK Tyagi, G Rekha, N Sreenath International Conference on E-Business and Telecommunications, 393-407, 2019 | 61 | 2019 |
Virtual source based multicast routing in WDM networks with sparse light splitting N Sreenath, N Krishna Mohan Reddy, G Mohan, CSR Murthy High Performance Switching and Routing, 2001 IEEE Workshop on, 141-145, 2001 | 52 | 2001 |
A comparative study on privacy preserving techniques for location based services AK Tyagi, N Sreenath Journal of Advances in Mathematics and Computer Science, 1-25, 2015 | 45 | 2015 |
Location privacy preserving techniques for location based services over road networks AK Tyagi, N Sreenath 2015 International Conference on Communications and Signal Processing (ICCSP …, 2015 | 36 | 2015 |
Robust scene text recognition: Using manifold regularized Twin-Support Vector Machine LM Francis, N Sreenath Journal of King Saud University-Computer and Information Sciences, 2019 | 34 | 2019 |
Countermeasures against multicast attacks on enhanced-on demand multicast routing protocol in manets N Sreenath, A Amuthan, P Selvigirija 2012 International Conference on Computer Communication and Informatics, 1-7, 2012 | 34 | 2012 |
SYN flooding attack—Identification and analysis K Geetha, N Sreenath International Conference on Information Communication and Embedded Systems …, 2014 | 33 | 2014 |
Future challenging issues in location based services AK Tyagi, N Sreenath International Journal of Computer Applications 114 (5), 2015 | 29 | 2015 |
A Review on Security and Privacy Issues in Internet of Things AK Tyagi, K Agarwal, D Goyal, N Sreenath Advances in Computing and Intelligent Systems, 489-502, 2020 | 28 | 2020 |
Byzantine attacks and its security measures in mobile adhoc networks A Geetha, N Sreenath IJCCIE 2016, 2016 | 28 | 2016 |
Detection of SYN flooding attack in mobile ad hoc networks with AODV protocol K Geetha, N Sreenath Arabian Journal for Science and Engineering 41 (3), 1161-1172, 2016 | 24 | 2016 |
Preserving location privacy in location based services against sybil attacks AK Tyagi, N Sreenath International Journal of Security and Its Applications 9 (12), 175-196, 2015 | 23 | 2015 |
An efficient clustering algorithm for Vanet A Malathi, N Sreenath International Journal of Applied Engineering Research 12 (9), 2000-2005, 2017 | 20 | 2017 |
TEDLESS–Text detection using least-square SVM from natural scene LM Francis, N Sreenath Journal of King Saud University-Computer and Information Sciences 32 (3 …, 2020 | 18 | 2020 |
Threats and vulnerabilities on TCP/OBS networks N Sreenath, K Muthuraj, GV Kuzhandaivelu 2012 International Conference on Computer Communication and Informatics, 1-5, 2012 | 17 | 2012 |
A two-phase approach for virtual topology reconfiguration of wavelength-routed WDM optical networks N Sreenath, GR Panesar, CSR Murthy Proceedings. Ninth IEEE International Conference on Networks, ICON 2001 …, 2001 | 17 | 2001 |
Location Privacy Preservation in VANET using Mix Zones–A survey C Kalaiarasy, N Sreenath, A Amuthan 2019 International Conference on Computer Communication and Informatics …, 2019 | 15 | 2019 |
Dynamic multi-stage tandem queue modeling-based congestion adaptive routing for MANET A Amuthan, N Sreenath, P Boobalan, K Muthuraj Alexandria Engineering Journal, 2017 | 14 | 2017 |